U.S. patent application number 15/117463 was filed with the patent office on 2016-12-01 for security technologies for electrically-powered trash compactors and receptacles.
The applicant listed for this patent is BIG BELLY SOLAR, INC.. Invention is credited to Michael E. Feldman, Douglas J. Furciniti, Jeffrey T. Satwicz, David J Skocypec.
Application Number | 20160347540 15/117463 |
Document ID | / |
Family ID | 53778542 |
Filed Date | 2016-12-01 |
United States Patent
Application |
20160347540 |
Kind Code |
A1 |
Skocypec; David J ; et
al. |
December 1, 2016 |
SECURITY TECHNOLOGIES FOR ELECTRICALLY-POWERED TRASH COMPACTORS AND
RECEPTACLES
Abstract
Systems, methods, and computer-readable storage media for
securing electrically-powered trash compactors and receptacles. A
system can monitor, under a security condition, a storage
receptacle having a security plate being positioned over a door on
the storage receptacle, the door including an insertion point for
storing contents on the storage receptacle, and the security plate
being configured to block an opening of the door to prevent
insertion of additional contents in the storage receptacle. Next,
the system can receive a signal indicating a security breach at the
storage receptacle, the security breach including at least one of a
first attempt to open the door and a second attempt to remove the
security plate. In response to the signal, the system can then
generate a notification of the security breach.
Inventors: |
Skocypec; David J;
(Medfield, MA) ; Satwicz; Jeffrey T.; (Weston,
MA) ; Furciniti; Douglas J.; (Groton, MA) ;
Feldman; Michael E.; (Framingham, MA) |
|
Applicant: |
Name |
City |
State |
Country |
Type |
BIG BELLY SOLAR, INC. |
Newton |
MA |
US |
|
|
Family ID: |
53778542 |
Appl. No.: |
15/117463 |
Filed: |
February 10, 2015 |
PCT Filed: |
February 10, 2015 |
PCT NO: |
PCT/US15/15220 |
371 Date: |
August 9, 2016 |
Related U.S. Patent Documents
|
|
|
|
|
|
Application
Number |
Filing Date |
Patent Number |
|
|
61937930 |
Feb 10, 2014 |
|
|
|
61937961 |
Feb 10, 2014 |
|
|
|
Current U.S.
Class: |
1/1 |
Current CPC
Class: |
B65F 2210/108 20130101;
B65F 2210/168 20130101; B65F 2210/148 20130101; G05B 15/02
20130101; B65F 1/1426 20130101; G08B 13/08 20130101; B30B 9/3032
20130101; B65F 2210/128 20130101; B65F 2210/20 20130101; B65F
2210/172 20130101; B65F 2210/1443 20130101; B65F 1/14 20130101;
B65F 2210/182 20130101; B30B 9/3007 20130101; B30B 15/28
20130101 |
International
Class: |
B65F 1/14 20060101
B65F001/14; G08B 13/08 20060101 G08B013/08 |
Claims
1. A method comprising: monitoring, under a security condition, a
storage receptacle having a security plate being positioned over a
door on the storage receptacle, the door comprising an insertion
point for storing contents on the storage receptacle, and the
security plate being configured to block an opening of the door to
prevent insertion of additional contents in the storage receptacle;
receiving a signal indicating a security breach at the storage
receptacle, the security breach comprising at least one of a first
attempt to open the door and a second attempt to remove the
security plate; and in response to the signal indicating the
security breach, generating, via a processor, a notification of the
security breach.
2. The method of claim 1, further comprising transmitting the
notification to a remote device.
3. The method of claim 1, wherein the notification comprises
information regarding at least one of the security breach and the
security condition.
4. The method of claim 1, wherein the security condition comprises
a security threat, and wherein the signal comprises sensed data
collected from a sensor at the storage receptacle.
5. The method of claim 1, further comprising generating an alarm
based on the indication of the security breach, the alarm
comprising at least one of a visual alarm and an audio alarm.
6. The method of claim 1, further comprising monitoring a data
connection associated with a communications device at the storage
receptacle to detect a connection state of the data connection, the
communications device comprising at least one of a communications
interface, an antenna, a receiver, and a transmitter.
7. A method comprising: detecting a security condition associated
with at least one of a storage receptacle and an area around the
storage receptacle; based on the security condition, installing a
security plate over a door on the storage receptacle, the door
comprising an insertion point for storing contents on the storage
receptacle, and the security plate being configured to block an
opening of the door to prevent insertion of additional contents in
the storage receptacle; based on the security condition, locking
the door in a closed position using a locking pin located inside
the storage receptacle, the locking pin limiting movement of the
door on the storage receptacle to further prevent insertion of
additional contents in the storage receptacle; and monitoring the
storage receptacle via a sensor configured to detect a security
breach associated with at least one of the door on the storage
device and the security plate.
8. The method of claim 7, wherein the security breach comprises at
least one of a first attempt to open the door, a second attempt to
remove the security plate, and a detection of a predetermined
substance making contact with the storage receptacle.
9. The method of claim 8, further comprising: detecting the
security breach; and sending, via a transmitter on the storage
receptacle, a signal to a remote device indicating that the
security breach was detected.
10. The method of claim 9, further comprising establishing a data
connection between the remote device and the storage receptacle,
wherein the data connection is used to send the signal.
11. The method of claim 10, further comprising monitoring the data
connection to detect a connection state of the data connection.
12. The method of claim 11, wherein the storage receptacle is
configured to send a security breach signal to the remote device
when a disconnection state of the data connection is detected.
13. The method of claim 12, wherein the disconnection state
triggers the transmitter on the storage device to send the signal
after a threshold period of interruption.
14. The method of claim 7, wherein the security plate is installed
over a top edge of the door to block the opening of the door.
15. The method of claim 7, further comprising installing a second
security plate over a second opening on the storage receptacle, the
second opening comprising a second insertion point for storing
contents in the storage receptacle.
16. The method of claim 15, wherein at least one of the security
plate and the second security plate are configured to display an
indication that the storage receptacle is out of order.
17. A receptacle comprising: a processor; a transmitter for
transmitting information to a remote device via a network; a
storage for storing content items; a sensor for detecting a
security condition associated with at least one of the receptacle
and an area around the receptacle; a security plate installed over
a door on the receptacle, the door comprising an insertion point
for storing contents on the storage of the receptacle, and the
security plate being configured to block an opening of the door to
prevent insertion of additional contents in the storage of the
receptacle; a locking pin for locking the door in a closed
position, the locking pin limiting movement of the door on the
receptacle to further prevent insertion of additional contents in
the storage of the receptacle; and a computer-readable storage
medium having stored therein instructions which, when executed by
the processor, cause the processor to perform operations
comprising: detecting the security condition; and generating a
signal indicating that the security condition has been
detected.
18. The receptacle of claim 17, the computer-readable storage
medium having stored therein instructions which, when executed by
the processor, result in an operation further comprising sending
the signal to a remote device via the transmitter, wherein an
installation of the security plate is triggered by a detection of
the security condition.
19. The receptacle of claim 17, wherein the security condition
comprises at least one of a first attempt to open the door and a
second attempt to remove the security plate.
20. The receptacle of claim 17, further comprising an energy
storage for powering operational functions performed by the
receptacle and a receiver for receiving information transmitted to
the receptacle via the network, the computer-readable storage
medium having stored therein instructions which, when executed by
the processor, result in operations further comprising: activating
the sensor on the receptacle; and receiving a measurement from the
sensor.
Description
CROSS REFERENCE TO RELATED APPLICATIONS
[0001] This application claims the benefit of priority to U.S.
Provisional Patent Application No. 61/937,930, filed on Feb. 10,
2014, entitled "SECURITY TECHNOLOGIES FOR ELECTRICALLY-POWERED
TRASH COMPACTORS AND RECEPTACLES," and U.S. Provisional Application
No. 61/937,961, filed on Feb. 10, 2014, entitled "DYNAMICALLY
ADJUSTABLE SENSORS FOR TRASH COMPACTORS AND RECEPTACLES", and all
of which are expressly incorporated by reference herein in their
entirety.
BACKGROUND
[0002] 1. Technical Field
[0003] The present disclosure relates to trash receptacles and more
specifically to security and monitoring technologies for
electrically-powered trash compactors and receptacles.
[0004] 2. Introduction
[0005] Collection of solid waste is an expensive and polluting
procedure. Every day, heavy trucks are deployed to collect large
amounts of trash and recyclable materials. Such trash and
recyclable materials are typically collected from numerous trash
receptacles throughout an area. Most communities provide trash
receptacles in dedicated areas of the community to allow nearby
individuals to properly dispose of their unwanted materials in a
quick and convenient manner. To this end, trash receptacles are
abundant in most places throughout the country. Not surprisingly,
trash receptacles are often essential to protecting the environment
and maintaining a clean community.
[0006] Unfortunately, the capabilities of trash receptacles to hold
waste material, and the widespread availability of such trash
receptacles, also make trash receptacles vulnerable to security
breaches. Unscrupulous individuals can easily utilize any of the
trash receptacles available in a community to hide and store
dangerous materials, such as bombs or hazardous chemicals, in an
effort to harm a community and its residents. Terrorists or
criminals generally have access to numerous trash receptacles,
where they can easily place dangerous materials and quickly turn
such trash receptacles into weapons ready to exert harm to anyone
around them. Given the large number of trash receptacles typically
available in any given area, it is extremely difficult to monitor
and secure each trash receptacle to prevent or detect such
atrocities. Accordingly, the current solutions, including today's
trash receptacles, do not provide adequate security features and
protections to foil--or even detect--a plot to harm a community and
its residents. Individuals who are intent on harming others in a
community can quickly spread the harm and danger throughout the
community using various trash receptacles in the area to hold
explosive and otherwise harmful materials setup to spread harm to
those around it.
SUMMARY
[0007] Additional features and advantages of the disclosure will be
set forth in the description which follows, and in part will be
understood from the description, or can be learned by practice of
the herein disclosed principles. The features and advantages of the
disclosure can be realized and obtained by means of the instruments
and combinations particularly pointed out in the appended claims.
These and other features of the disclosure will become more fully
apparent from the following description and appended claims, or can
be learned by the practice of the principles set forth herein.
[0008] The approaches set forth herein can be used to effectively
monitor and secure trash receptacles during a security condition,
to prevent a security breach of the trash receptacle. The trash
receptacles can be constructed to allow any of its insertion points
to be closed, locked, and protected in order to prevent individuals
from inserting contents into the storage receptacle during a
security condition, or otherwise accessing the contents of the
storage receptacle. The storage receptacles can be also configured
to monitor and detect any security breaches to the storage
receptacle; attempts (complete or incomplete) to place dangerous
materials, such as bombs, weapons, or drugs, in the storage
receptacle; attempts (complete or incomplete) to harm the storage
receptacle or use the storage receptacle in a conspiracy to harm
others, etc. Here, the storage receptacle can be configured to
communicate such security breaches and events to remote users and
devices, such as a monitoring server or a government official. For
example, a receptacle can monitor, in a security condition, for
attempts to breach a door of the receptacle or in some other way to
reach an interior of the receptacle. Once a security breach is
detected, the receptacle can transmit a warning signal over a
network to a server at which point an automated or manual system
can notify authorities. This way, the storage receptacles can
quickly provide alerts and notifications to the proper authorities
and personnel, to prevent unauthorized access to the storage
receptacle and allow a quick and proper response to any attempts
thereof.
[0009] The storage receptacle can also be configured to detect
dangerous substances that come in contact with one or more
components of the storage receptacle. For example, the storage
receptacle can be configured to detect if explosive materials are
inserted into the storage receptacle. In some cases, the storage
receptacle can be configured with a sensor or scanner capable of
detecting if a person that has touched a portion of the storage
receptacle, such as the handle, has left any traces of an explosive
substance, such as gun powder, on the touched portion of the
storage receptacle. For example, if an individual with traces of
gun powder or bomb making materials on his or her hand grabs the
handle of the storage receptacle to open the door, the storage
receptacle can detect the traces of gun powder or bomb making
materials, and generate a signal or alarm. The storage receptacle
can then transmit the signal to a remote server or another entity,
such as a police department, to alert others of the detected traces
of explosive materials. In some embodiments, the storage receptacle
can use a sensor or detection component to detect the dangerous or
security condition, and trigger an automatic security system to
lock the storage receptacle. For example, the storage receptacle
can detect a security condition, such as a breach or an explosive
material, and initiate an automatic locking of any doors or access
points in the storage receptacle by transmitting a signal from a
processor to a locking mechanism. Here, the locking mechanism can
include, for example, a gear system, a spool device, a pin and lock
system, a pulley, a linear actuator, a plate, or any other locking
system.
[0010] In some cases, the storage receptacles can be configured to
generate a visual or audible alarm when it detects any breach
attempts or explosive materials. This can scare a potential
criminal from continuing to try and break into the receptacle or
dispose unlawful materials into the receptacle. Moreover, the
storage receptacles can maintain a data connection with one or more
remote devices to facilitate the monitoring of conditions around
the storage receptacle and collect relevant data and statistics. If
a problem or disconnection of the data connection is detected, a
remote device or personnel can be quickly notified of the
disconnected state and quickly respond by sending support personnel
or, if necessary, security officials. The storage receptacle can
also be configured to operate in various alert modes based on
specific security conditions or levels. Once a security condition
is contained or otherwise remedied, the storage receptacles can be
restored to once again allow user access to its insertion points
and further resume normal operation.
[0011] Disclosed security and monitoring technologies for
electrically-powered trash compactors and receptacles. A system can
monitor, under a security condition, a storage receptacle having a
security plate being positioned over a door on the storage
receptacle, the door including an insertion point for storing
contents on the storage receptacle, and the security plate being
configured to block an opening of the door to prevent insertion of
additional contents in the storage receptacle. The system can
monitor the storage receptacle using sensors, data connections,
algorithms, user feedback, news information, usage and performance
data, device statistics, and so forth. For example, the system can
monitor a data connection of the storage receptacle, as well as
sensed data collected by sensors at the storage receptacle and
transmitted to the system via the data connection. Through the data
connection, the system can also receive, from the storage
receptacle, a current status of the storage receptacle, a current
usage, information about running services at the storage
receptacle, errors at the storage receptacle, logged information,
etc.
[0012] Next, the system can receive a signal indicating a security
breach at the storage receptacle, the security breach including at
least one of a first attempt to open the door and a second attempt
to remove the security plate. The system can receive the signal
from a transmitter at the storage receptacle, for example.
Moreover, the storage receptacle can generate the signal based on
sensed data, performance logs, errors, current usage information,
etc., as previously described.
[0013] In response to the signal, the system can then generate a
notification of the security breach. The notification can be an
alert, a report, an alarm, a message, another signal, etc. The
system can also send the notification to another user or device,
such as a remote server or a device associated with a security
official. In some aspects, the system can also store the
notification in a database or storage to maintain statistics,
evidence, logs, and data relating to the security breach and any
other previous security breach. The system can also analyze the
signal or notification and generate a recommendation, such as a
recommended or suggested response.
BRIEF DESCRIPTION OF THE DRAWINGS
[0014] In order to describe the manner in which the above-recited
and other advantages and features of the disclosure can be
obtained, a more particular description of the principles briefly
described above will be rendered by reference to specific
embodiments thereof which are illustrated in the appended drawings.
Understanding that these drawings depict only exemplary embodiments
of the disclosure and are not therefore to be considered to be
limiting of its scope, the principles herein are described and
explained with additional specificity and detail through the use of
the accompanying drawings in which:
[0015] FIG. 1 illustrates an example system embodiment;
[0016] FIG. 2 illustrates an example architecture for remotely
controlling electrically-powered compactors;
[0017] FIG. 3 illustrates an example storage receptacle;
[0018] FIGS. 4A and 4B illustrate a front view of exemplary
unsecured and secured storage receptacles;
[0019] FIGS. 5A-B illustrate rear views of an exemplary storage
receptacle;
[0020] FIGS. 5C-D illustrate open views of an exemplary storage
receptacle;
[0021] FIG. 6 illustrates an exemplary backside view of a security
plate for a receptacle;
[0022] FIG. 7 illustrates an exemplary inside locking mechanism for
a receptacle;
[0023] FIG. 8 illustrates a first example method embodiment;
and
[0024] FIG. 9 illustrates a second example method embodiment.
DETAILED DESCRIPTION
[0025] Various embodiments of the disclosure are described in
detail below. While specific implementations are described, it
should be understood that this is done for illustration purposes
only. Other components and configurations may be used without
parting from the spirit and scope of the disclosure.
[0026] The present disclosure provides a way to monitor and secure
electrically-powered trash compactors and receptacles. A system,
method and computer-readable media are disclosed which provide
monitoring and security to electrically-powered trash compactors
and receptacles. A brief introductory description of a basic
general purpose system or computing device in FIG. 1, which can be
employed to practice the concepts, is disclosed herein. A more
detailed description and variations of electrically-powered
receptacles, as well as receptacle monitoring and security systems
will then follow. These variations shall be described herein as the
various embodiments are set forth. The disclosure now turns to FIG.
1.
[0027] With reference to FIG. 1, an exemplary system and/or
computing device 100 includes a processing unit (CPU or processor)
120 and a system bus 110 that couples various system components
including the system memory 130 such as read only memory (ROM) 140
and random access memory (RAM) 150 to the processor 120. The system
100 can include a cache 122 of high-speed memory connected directly
with, in close proximity to, or integrated as part of the processor
120. The system 100 copies data from the memory 130 and/or the
storage device 160 to the cache 122 for quick access by the
processor 120. In this way, the cache provides a performance boost
that avoids processor 120 delays while waiting for data. These and
other modules can control or be configured to control the processor
120 to perform various operations or actions. Other system memory
130 may be available for use as well. The memory 130 can include
multiple different types of memory with different performance
characteristics. It can be appreciated that the disclosure may
operate on a computing device 100 with more than one processor 120
or on a group or cluster of computing devices networked together to
provide greater processing capability. The processor 120 can
include any general purpose processor and a hardware module or
software module, such as module 1 162, module 2 164, and module 3
166 stored in storage device 160, configured to control the
processor 120 as well as a special-purpose processor where software
instructions are incorporated into the processor. The processor 120
may be a self-contained computing system, containing multiple cores
or processors, a bus, memory controller, cache, etc. A multi-core
processor may be symmetric or asymmetric. The processor 120 can
include multiple processors, such as a system having multiple,
physically separate processors in different sockets, or a system
having multiple processor cores on a single physical chip.
Similarly, the processor 120 can include multiple distributed
processors located in multiple separate computing devices, but
working together such as via a communications network. Multiple
processors or processor cores can share resources such as memory
130 or the cache 122, or can operate using independent resources.
The processor 120 can include one or more of a state machine, an
application specific integrated circuit (ASIC), or a programmable
gate array (PGA) including a field PGA.
[0028] The system bus 110 may be any of several types of bus
structures including a memory bus or memory controller, a
peripheral bus, and a local bus using any of a variety of bus
architectures. A basic input/output (BIOS) stored in ROM 140 or the
like, may provide the basic routine that helps to transfer
information between elements within the computing device 100, such
as during start-up. The computing device 100 further includes
storage devices 160 or computer-readable storage media such as a
hard disk drive, a magnetic disk drive, an optical disk drive, tape
drive, solid-state drive, RAM drive, removable storage devices, a
redundant array of inexpensive disks (RAID), hybrid storage device,
or the like. The storage device 160 can include software modules
162, 164, 166 for controlling the processor 120. The system 100 can
include other hardware or software modules. The storage device 160
is connected to the system bus 110 by a drive interface. The drives
and the associated computer-readable storage devices provide
nonvolatile storage of computer-readable instructions, data
structures, program modules and other data for the computing device
100. In one aspect, a hardware module that performs a particular
function includes the software component stored in a tangible
computer-readable storage device in connection with the necessary
hardware components, such as the processor 120, bus 110, display
170, and so forth, to carry out a particular function. In another
aspect, the system can use a processor and computer-readable
storage device to store instructions which, when executed by the
processor, cause the processor to perform operations, a method or
other specific actions. The basic components and appropriate
variations can be modified depending on the type of device, such as
whether the device 100 is a small, handheld computing device, a
desktop computer, or a computer server. When the processor 120
executes instructions to perform "operations", the processor 120
can perform the operations directly and/or facilitate, direct, or
cooperate with another device or component to perform the
operations.
[0029] Although the exemplary embodiment(s) described herein
employs the hard disk 160, other types of computer-readable storage
devices which can store data that are accessible by a computer,
such as magnetic cassettes, flash memory cards, digital versatile
disks (DVDs), cartridges, random access memories (RAMs) 150, read
only memory (ROM) 140, a cable containing a bit stream and the
like, may also be used in the exemplary operating environment.
Tangible computer-readable storage media, computer-readable storage
devices, or computer-readable memory devices, expressly exclude
media such as transitory waves, energy, carrier signals,
electromagnetic waves, and signals per se.
[0030] To enable user interaction with the computing device 100, an
input device 190 represents any number of input mechanisms, such as
a microphone for speech, a touch-sensitive screen for gesture or
graphical input, keyboard, mouse, motion input, speech and so
forth. An output device 170 can also be one or more of a number of
output mechanisms known to those of skill in the art. In some
instances, multimodal systems enable a user to provide multiple
types of input to communicate with the computing device 100. The
communications interface 180 generally governs and manages the user
input and system output. There is no restriction on operating on
any particular hardware arrangement and therefore the basic
hardware depicted may easily be substituted for improved hardware
or firmware arrangements as they are developed.
[0031] For clarity of explanation, the illustrative system
embodiment is presented as including individual functional blocks
including functional blocks labeled as a "processor" or processor
120. The functions these blocks represent may be provided through
the use of either shared or dedicated hardware, including, but not
limited to, hardware capable of executing software and hardware,
such as a processor 120, that is purpose-built to operate as an
equivalent to software executing on a general purpose processor.
For example the functions of one or more processors presented in
FIG. 1 may be provided by a single shared processor or multiple
processors. (Use of the term "processor" should not be construed to
refer exclusively to hardware capable of executing software.)
Illustrative embodiments may include microprocessor and/or digital
signal processor (DSP) hardware, read-only memory (ROM) 140 for
storing software performing the operations described below, and
random access memory (RAM) 150 for storing results. Very large
scale integration (VLSI) hardware embodiments, as well as custom
VLSI circuitry in combination with a general purpose DSP circuit,
may also be provided.
[0032] The logical operations of the various embodiments are
implemented as: (1) a sequence of computer implemented steps,
operations, or procedures running on a programmable circuit within
a general use computer, (2) a sequence of computer implemented
steps, operations, or procedures running on a specific-use
programmable circuit; and/or (3) interconnected machine modules or
program engines within the programmable circuits. The system 100
shown in FIG. 1 can practice all or part of the recited methods,
can be a part of the recited systems, and/or can operate according
to instructions in the recited tangible computer-readable storage
devices. Such logical operations can be implemented as modules
configured to control the processor 120 to perform particular
functions according to the programming of the module. For example,
FIG. 1 illustrates three modules Mod1 162, Mod2 164 and Mod3 166
which are modules configured to control the processor 120. These
modules may be stored on the storage device 160 and loaded into RAM
150 or memory 130 at runtime or may be stored in other
computer-readable memory locations.
[0033] One or more parts of the example computing device 100, up to
and including the entire computing device 100, can be virtualized.
For example, a virtual processor can be a software object that
executes according to a particular instruction set, even when a
physical processor of the same type as the virtual processor is
unavailable. A virtualization layer or a virtual "host" can enable
virtualized components of one or more different computing devices
or device types by translating virtualized operations to actual
operations. Ultimately however, virtualized hardware of every type
is implemented or executed by some underlying physical hardware.
Thus, a virtualization compute layer can operate on top of a
physical compute layer. The virtualization compute layer can
include one or more of a virtual machine, an overlay network, a
hypervisor, virtual switching, and any other virtualization
application.
[0034] The processor 120 can include all types of processors
disclosed herein, including a virtual processor. However, when
referring to a virtual processor, the processor 120 includes the
software components associated with executing the virtual processor
in a virtualization layer and underlying hardware necessary to
execute the virtualization layer. The system 100 can include a
physical or virtual processor 120 that receive instructions stored
in a computer-readable storage device, which cause the processor
120 to perform certain operations. When referring to a virtual
processor 120, the system also includes the underlying physical
hardware executing the virtual processor 120.
[0035] Having disclosed some components of a computing system, the
disclosure now turns to FIG. 2, which illustrates an exemplary
architecture for controlling electrically-powered compactors both
locally and remotely via a network. Receptacle 204 can be an
electrically-powered receptacle for collecting waste, such as trash
and recyclables, for example. Receptacle 204 can be, for example, a
solar or battery-powered receptacle and/or compactor. Moreover,
receptacle 204 can include a motor 226 for performing various
operations, such as compaction operations. Further, receptacle 204
can be remotely controlled using a remote control device (RCD) 244
via a network 202 or an air interface. To this end, receptacle 204
can include transmitter 206 and receiver 208 for communicating with
RCD 244. In particular, transmitter 206 and receiver 208 can
communicate with transmitter 240 and receiver 242 on RCD 244, and
vice versa. Here, transmitters 206 and 240 can transmit
information, and receivers 208 and 242 can receive information.
This way, receptacle 204 and RCD 244 can be connected to transmit
and receive information, such as instructions, commands,
statistics, alerts, notifications, files, software, data, and so
forth. Receptacle 204 can also communicate with other devices, such
as a server and/or a collection vehicle, via transmitter 206 and
receiver 208. Similarly, RCD 244 can communicate with other
devices, such as a server and/or a user device 246, 252, via
transmitter 240 and receiver 242. A protocol, such as Bluetooth,
can be used in which no network other than the air interface is
between the receptacle 204 and RCD 244. Thus, a user with a
portable device 244 can simply get within a range for a Bluetooth
communication and send a command to turn off an alarm as the user
views that no-one is trying to breach into the receptacle 204.
[0036] Moreover, receptacle 204 and RCD 244 can communicate with
each other and/or other devices via network 202. The network 202
can include a public network, such as the Internet, but can also
include a private or quasi-private network, such as an intranet, a
home network, a virtual private network (VPN), a shared
collaboration network between separate entities, etc. Indeed, the
network 202 can include many types of networks, such as local area
networks (LANs), virtual LANs (VLANs), corporate networks, wide
area networks, a cell phone transmitter and receiver, a WiFi
network, a Bluetooth network, and virtually any other form of
network.
[0037] Transmitter 206 and receiver 208 can be connected to printed
circuit board (PCB) 210, which controls various functions on
receptacle 204. In some embodiments, the RCD 244 can be
incorporated within the PCB 210. In FIG. 2, the RCD 244 is
electrically connected to the PCB 210 via transmitters 206, 240 and
receivers 208, 242. The RCD 244 can be connected to transmitter 240
and receiver 242 via a two-way communication port, which includes
transmitter 240 and receiver 242. The PCB 210 can control
electrical functions performed by the receptacle 204. Electrical
functions can include, for example, running compactions by
actuating a motor 226; sensing waste or recyclables volume inside
the receptacle 204 using a sensor at regular or programmable
intervals, such as a sonar-based sensor 222A, a proximity sensor,
and/or photoeye sensors 222B-C; changing status lamps 230 at
regular and/or programmable thresholds to/from a color indicating
that the receptacle 204 is not full (e.g., green), to/from a color
indicating that the receptacle 204 is almost full (e.g., yellow),
to/from a color indicating that the receptacle 204 is full (e.g.,
red); etc.
[0038] The RCD 244 can enable remote control and/or alteration of
the functions performed or operated by the PCB 210. The RCD 244 can
also provide access to, and control over, the various components
206, 208, 210, 212, 214A-B, 216, 218, 220, 222A-G, 224, 226, 228,
230, 232, 234, 236, 238 of the receptacle 204. Users can use a
networked device, such as smartphone 246 and/or remote device 252,
to communicate with the RCD 244 in order to manage and/or control
the receptacle 204. For example, a user can communicate with the
RCD 244 via the remote device 252 to change a threshold value on
the PCB 210, which can control, for example, a collection timing;
the compaction motor 226; the use of energy on a lighted
advertising display, such as display 232; the status lamps 230; the
sensors 222A-H; the camera 224; etc. The remote device 252 can
include virtually any device with networking capabilities, such as
a laptop, a portable media player, a tablet computer, a gaming
system, a smartphone, a global positioning system (GPS), a smart
television, a desktop, etc. In some embodiments, the remote device
252 can also be in other forms, such as a watch, imaging
eyeglasses, an earpiece, etc.
[0039] The remote device 252 and RCD 204 can be configured to
automatically modify the PCB's 210 operating parameters. However,
users can also manually modify the PCB's 210 operating parameters
via the remote device 252 and RCD 204. The operating parameters can
be modified in response to, for example, evolving industry
benchmarks; user inputs; historical data, such as the data gathered
from a separate database 250A-B; forecasted data, such as upcoming
weather characteristics; traffic conditions; a collection schedule;
a collection route; a proximity of a collection vehicle; a time
and/or date; a location; a capacity, such as a capacity of the
receptacle 204 and/or a capacity of a collection vehicle; a
fullness state of the receptacle 204; lapsed time between
collections; lapsed time between compactions; usage conditions of
the receptacle 204; energy usage; battery conditions; statistics; a
policy; regulations; a detected movement of an object, such as an
object inside or outside of the receptacle 204; collection trends;
industry and/or geographical standards; zoning policies and
characteristics; real-time information; user preferences; and other
data. The data from the remote device 252 can be relayed to the RCD
244, and the data from the RCD 244 can be relayed, via the network
202, to the receptacle 204 and/or the remote device 252 for
presentation to the user.
[0040] The user can control the RCD 244 and/or access and modify
information on the RCD 244 via a user interface, such as a web
page, an application 254, a monitor 256, and/or via voice messages
and commands, text messages, etc. The remote device 252 can include
a user interface, which can display, for example, graphs of
collection statistics and trends (e.g., collection frequency,
usage, temperature, etc.), collection reports, device settings,
collection schedules, collection configurations, historical data,
status information, collection policies, configuration options,
device information, collection routes and information, alerts, etc.
This way, users can access information to make educated decisions
about how to set and/or reset operating parameters on the PCB 210;
to control, for example, which sensors are used to gather data,
which thresholds to set; to control outputs from the status lamps
230 and other components; etc. User can change settings on the
receptacle 204, such as optimal collection timing, timing of sensor
actuation; and/or modify parameters, such as desired capacity and
fullness thresholds; using a scroll down menu, click-and-slide
tools, interactive maps displayed on the remote device 252, touch
screens, forms, icons, text entries, audio inputs, text inputs,
etc. In response, the RCD 244 can automatically reconfigure the PCB
210 settings, recalibrate sensors and displays, change operating
parameters, etc.
[0041] The RCD 244 can include a two-way communication port that
includes transmitter 240 and receiver 242, which can wirelessly
communicate with the PCB 210 of the receptacle 204, via the
transmitter 206 and receiver 208 on the receptacle 204, which are
connected electrically to the PCB 210. On scheduled and/or
programmable intervals, the PCB's 210 transmitter 206 can send data
to a central server, such as data server 248, via the network 202.
Moreover, the RCD's 244 receiver 242 can be configured to query the
data server 248, which can also be connected to the remote device
252, for incoming data. The data server 248 can communicate data
from databases 250A-B. If there is no data to be received by the
receiver 208, the PCB 210 can be configured to promptly return to a
low-power mode, where the transmitter 206 and receiver 208 circuits
are turned off, until another scheduled, received, initiated,
and/or programmed communication event. If there is data to be
received by the receiver 208, such as a command to turn the
receptacle 204 off and then back on, a command to change the
thresholds upon which compactions are operated, a command to change
the thresholds for providing status updates and/or determining
fullness states, etc., then the RCD receiver 242 can download the
new data from the data server 248, via the RCD 244, to the PCB 210,
altering its operating configuration. The RCD receiver 242 can also
be configured to send data to the data server 248 to acknowledge
the receipt of data from the PCB 210, and to send selected data to
the remote device 252, the smartphone 246, and/or any other device,
for presentation to a user.
[0042] The data server 248 can also display the data to a user on
remote device 252, smartphone 246, or any other device. The data
can be a password-protected web page, a display on the smartphone
246, a display on the monitor 256, etc. Remote control using the
RCD 244 to reconfigure operating thresholds, sensor use, sensor
hierarchy, energy usage, etc., can enable the receptacle 204 to
alter characteristics that control its energy generation, energy
consumption, and/or the collection and management logistics,
further enabling sound operation of the receptacle 204.
[0043] The RCD 244 can be configured to communicate over a wireless
network with the PCB 210, and transmit data to the data server 248,
so the data can be stored for viewing and manipulation by a user
via any web-connected computer, phone, or device. The RCD 244 can
also be configured to receive data from the data server 248, and
transmit the data back to the PCB 210. The PCB 210 can be
electrically connected to a variety of sensors, such as sensors
222A-H, within the receptacle 204. Through the RCD 244, the PCB 210
can also be wirelessly connected to the databases 250A-B, and/or
other external databases, such as a weather database, which may,
for example, reside on a National Oceanographic and Atmospheric
(NOAA) server, a database of trucks and locations and schedules,
which may reside on a waste hauler's server, a database of traffic
conditions, etc. A user can also change which of the sensors 222A-H
are used in setting thresholds, among other things, in response to,
for example, user commands and/or changes in outside data, such as
weather data or truck location data.
[0044] The PCB 210 can also communicate with a temperature sensor
222G to gather temperature information, which can be transmitted to
the RCD 244 via the PCB transmitter 206. The temperature
information can be used, among other things, to fine tune
operational functions and energy consumption of the receptacle 204.
For example, the PCB 210 can be reconfigured to run less compaction
per day, such as four to eight compactions, in cold weather, since
batteries are less powerful in cold weather. Coinciding with cold
weather, the winter days are shorter, thus solar energy and battery
power is limited. In order to conserve power on low-sunlight days,
the RCD 244 can adjust the PCB's 210 normal fullness sensitivity
levels, so that collections are prompted to be made earlier. For
example, if the PCB 210 typically runs 20 compactions before
changing status lamps from green to yellow, a signal that suggests
optimal collection time, the RCD 244 can adjust the thresholds of
the PCB 210 to run 10 compactions before changing from a green
state to a yellow state, thus changing the total energy consumption
of the compactor between collections. In a busy location, the PCB
210 can be configured to sense receptacle fullness every minute,
whereas in a less busy location, the PCB 210 can be configured to
sense fullness once a day.
[0045] In some embodiments, the RCD 244 can also alter the timing
of events using algorithms based on the results of historical
events. For example, the RCD 244 can be initially configured to
sense fullness once per minute, but based on resulting readings, it
can then alter the timing of future readings. Thus, if three
consecutive readings taken at one-minute intervals yield a result
of no trash accumulation, the RCD 244 can increase the timing
between readings to two minutes, then three minutes, etc., based on
the various readings. The RCD 244 can also be configured to adjust
sensing intervals based on the level of fullness of the receptacle
204, so it would sense more frequently as the receptacle 204 fills,
in order to reduce the margin of error at a critical time, before
the receptacle 204 overflows. This "learning feature" can save
energy by ultimately synchronizing the sensor readings with actual
need to sense. The RCD 244 can also alter thresholds of status
lamps 230 based on collection history, the need for capacity as
determined by the frequency of red or yellow lights on the
receptacle 204, temperatures, expected weather and light
conditions, expected usage conditions, etc. The status lamps 230
can be LED lights, for example.
[0046] In FIG. 2, the RCD 244 can be enabled, via the PCB 210, to
read, for example, a temperature sensor 222G; an encoder sensor
222D, which can measure movement of a compaction ram by utilizing
an "encoder wheel" which is mounted on a motor shaft; one or more
photoeye sensors 222B-C; door sensors; a sensor which measures
current from the solar panel and a sensor which can measure current
from the battery 236 to the motor 226; a hall effect sensor 222F,
which can detect movement of, for example, a door; an infrared (IR)
sensor 222E, a camera 224, etc. In addition, the thresholds set by
the RCD 244 can be based on historical and real-time information,
user preferences, industry norms, weather patterns and forecasts,
and other information. The RCD 244 can reset the PCB's 210 normal
thresholds hourly, daily, weekly, monthly, yearly, or at adjustable
intervals, based on a variety of information and user
decisions.
[0047] The RCD 244 can also alter the PCB's 210 normal hierarchy of
sensor usage. For example, if the PCB 210 is configured to run a
compaction cycle when one or more of the photoeyes 222B-C located
inside the receptacle 204 are blocked, the RCD 244 can reconfigure
the sensor hierarchy by reconfiguring the PCB 210 to run compaction
cycles after a certain amount of time has passed, by reading the
position of the encoder sensor 222D at the end of a cycle, by
reading one or more photoeye sensors 222B-C, by calculating a
sensor hierarchy based on historical filling rates, by a change in
user preferences, etc. Using an aggregate of data from other
receptacles located worldwide in a variety of settings, the RCD's
244 configurations can depend on constantly evolving parameters for
optimizing energy utilization, capacity optimization, and
operational behavior, among other things. The RCD 244 innovation
and growing database of benchmarks, best practices and solutions to
inefficiency, enables the receptacle 204 to adapt and evolve.
[0048] Based on the data from the PCB 210, the sensors, inputs by
the users (e.g., the customer or the manufacturer) via the RCD 244,
and/or based on other data, such as historical or weather data, the
RCD 244 can change the PCB 210 thresholds, operational parameters,
and/or configuration, to improve the performance of the receptacle
204 in different geographies or seasons, or based on different user
characteristics or changing parameters. Thus, the system and
architecture can be self-healing.
[0049] The RCD 244 can also be configured to change the PCB's 210
normal operating parameters. For example, the RCD 244 can be
configured to cause the PCB 210 to run multiple compaction cycles
in a row, to run energy through a resistor 220 to apply a strong
load upon the battery 236, which can supply the energy. The RCD 244
can measure battery voltage at predetermined or programmable
intervals, to measure the "rebound" of the battery 236. A strong
battery will gain voltage quickly (e.g., the battery will almost
fully recover within 15 minutes or so). A weak battery will drop
significantly in voltage (e.g., 3-5 volts), will recover slowly, or
will not recover to a substantial portion of its original voltage.
By changing the normal parameters of the PCB 210, the battery 236
can be subjected to a heavy load during a test period, which will
determine the battery's strength without jeopardizing operations.
The RCD 244 can then be configured to relay a message to the user
that a battery is needed, or to use the battery differently, for
example, by spacing out compactions in time, reducing the degree of
voltage decline within a certain time period, etc. Based on the
message and any additional information from the RCD 244, the user
can then order a new battery by simply clicking on a button on a
web page, for example. The RCD 244 can also alter the PCB 210 to do
more compactions or other energy-using functions (like downloading
software) during the daytime, when solar energy is available to
replenish the battery 236 as it uses energy.
[0050] Since the RCD 244 can be connected to databases, and can be
informed by the PCB 210 on each receptacle of conditions or status
information at the respective receptacle, the RCD 244 can also be
used to relay data collected from the databases or PCB 210 for
other types of servicing events. In other words, the RCD 244 can
obtain, collect, maintain, or analyze status, operating, or
conditions information received from the PCB 210 of one or more
receptacles and/or one or more databases storing such information,
and relay such data to a separate or remote device, such as a
remote server or control center. For example, the RCD 244 can be
configured to relay a message to a waste hauler to collect the
receptacle 204 if two or more parameters are met simultaneously. To
illustrate, the RCD 244 can relay a message to a waste hauler to
collect the receptacle 204 if the receptacle 204 is over 70% full
and a collection truck is within 1 mile of the receptacle 204. The
RCD 244 can then send a message to the remote device 252 to alert a
user that a collection had been made, and the cost of the
collection will be billed to the user's account.
[0051] In addition, the RCD 244 can change the circuitry between
the solar panel 234 and the battery 236, so that solar strength can
be measured and an optimal charging configuration can be selected.
The charging circuitry 214A-B is illustrated as two circuitries;
however, one of ordinary skill in the art will readily recognize
that some embodiments can include more or less circuitries.
Charging circuits 214A-B can be designed to be optimized for low
light or bright light, and can be switched by the RCD 244 based on
programmable or pre-determined thresholds. Also, while solar
information can be readily available (e.g., Farmers' Almanac),
solar energy at a particular location can vary widely based on the
characteristics of the site. For example, light will be weaker if
reflected off a black building, and if the building is tall,
blocking refracted light. For this reason, it can be useful to
measure solar energy on site, as it can be an accurate determinant
of actual energy availability at a particular location. To do this,
the battery 236 and solar panel 234 can be decoupled using one or
more charging relays 212. In other aspects, a very high load can be
placed on the battery 236 to diminish its voltage, so that all
available current from the solar panel 234 flows through a
measureable point. This can be done, for example, by causing the
receptacle 204 to run compaction cycles, or by routing electricity
through a resistor, or both.
[0052] There are a variety of other methods which can be used to
create a load. However, putting a load on the battery 236 can cause
permanent damage. Thus, the RCD 244 can also be configured to
disconnect the battery 236 from the solar panel 234, instead
routing electricity through a resistor 220. This can allow for an
accurate measurement of solar intensity at a particular location,
without depleting the battery 236, which can help assess the
potential for running compactions, communicating, powering
illuminated advertisements, and powering other operations. In some
embodiments, the PCB 210 can be reconfigured by the RCD 244 to run
continuous compaction cycles for a period of time, measure solar
panel charging current, relay the data, and then resume normal
operations. Different configurations or combinations of circuits
can be used to test solar intensity, battery state or lifecycle,
and/or predict solar or battery conditions in the future.
[0053] The RCD 244 can also track voltage or light conditions for a
period of days, and alter the state of load and charging based on
constantly changing input data. For example, the RCD 244 can
configure the timer 218 of the PCB 210 to turn on the display 232
for advertising for a number of days in a row, starting at a
specific time and ending at another specific time. However, if the
battery voltage declines over this period of time, the RCD 244 can
then reduce the time of the load (the display 232) to every other
day, and/or may shorten the time period of the load each day.
Further, the RCD 244 can collect information on usage and weather
patterns and reconfigure the PCB's 210 normal operating regimen to
increase or reduce the load (for example, the advertisement on the
display 232) placed on the battery 236, based on the information
collected. For example, if it is a Saturday, and expected to be a
busy shopping day, the RCD 244 can allow a declining state of the
battery 236, and can schedule a period on the near future where a
smaller load will be placed on the battery 236, by, for example,
not running the advertisement on the coming Monday. In doing so,
the RCD 244 can optimize the advertising value and energy
availability to use energy when it is most valuable, and recharge
(use less energy) when it is less valuable. In order to maximize
solar energy gained from a variety of locations, the RCD 244 can
cause the PCB 210 to select between one of several charging
circuits. For example, if it is anticipated that cloudy conditions
are imminent, the RCD 244 can change the circuit that is used for
battery charging, in order to make the charger more sensitive to
lower light conditions. In a sunny environment, the charger circuit
used can be one with poor low-light sensitivity, which would yield
more wattage in direct sunlight.
[0054] The architecture 200 can also be used for monitoring
functions, which can enable users to access information about the
receptacle 204 and collection process. With this information, users
can make judgments that facilitate their decision-making, helping
them remotely adjust settings on the receptacle 204 to improve
performance and communication. For example, the RCD 244 can be
configured to enable users to easily adjust callback time, which is
the normal time interval for communication that is configured in
the PCB 210. The RCD 244 can enable the user to alter this time
setting, so that the receptacle 204 communicates at shorter or
longer intervals. Once the PCB 210 initiates communication, other
parameters can be reconfigured, such as awake time, which is the
amount of time the receiver is in receiving mode. This enables
users to make "on the fly" changes. In some cases, the PCB 210 can
shut down after sending a message and listening for messages to be
received. In these cases, it can be difficult to send instructions,
wait for a response, send more instructions and wait for response,
because the time lapse between normal communications can be a full
day. However, by remotely adjusting the setting through the RCD
244, the user can make continuous adjustments while testing out the
downloaded parameters in real time, and/or close to real time. This
can enhance the ability of the user to remotely control the
receptacle 204.
[0055] Further, the RCD 244 can alter the current of the photoeyes
222B-C, in a test to determine whether there is dirt or grime
covering the lens. Here, the RCD 244 can reconfigure the normal
operating current of the photoeyes 222B-C. If the lens is dirty,
the signal emitter photoeye will send and the signal receiver will
receive a signal on high power, but not on low power. In this way,
a service call can be avoided or delayed by changing the normal
operating current to the photoeyes 222B-C. This can be a useful
diagnostic tool.
[0056] In some embodiments, regular maintenance intervals can be
scheduled, but can also be altered via information from the RCD
244. The RCD 244 can be configured to run a cycle while testing
motor current. If motor current deviates from a normal range (i.e.,
2 amps or so), then a maintenance technician can be scheduled
earlier than normal. The RCD 244 can send a message to the user by
posting an alert on the users web page associated with the
receptacle 204.
[0057] Other settings can be embodied in the receptacle 204 as
well. For example, the PCB 210 can sense that the receptacle 204 is
full. The RCD 244 can then configure the PCB 210 to have a web
page, or another display, present a full signal. The RCD 244 can
alter when the full signal should be presented to the user. For
example, after accessing a database with historical collection
intervals, the RCD 244 can reconfigure the PCB 210 to wait for a
period of time, e.g., one hour, before displaying a full signal at
the web page. This can be helpful because, in some cases, a "false
positive" full signal can be signaled by the PCB 210, but this can
be avoided based on historical information that indicates that a
collection only a few minutes after the last collection would be
highly aberrational. The RCD 244 can thus be configured to override
data from the PCB 210. Instead of sending a full signal to the
user, the RCD 244 reconfigures the PCB 210 to ignore the full
signal temporarily, and delay the display of a full-signal on the
users' web page or smart phone, in order for time to go by and
additional information to be gathered about the receptacle's actual
fullness status. For example, when a collection is made and ten
minutes later, the fullness sensor detects the receptacle 204 is
full, the fullness display message on the web page can be prevented
from displaying a full status. In some cases, the bag can be full
of air, causing the proximity sensor in the receptacle 204 to
detect a full bin. Within a certain time period, e.g., twenty
minutes in a busy location, a few hours in a less busy location, as
determined based on the historical waste generation rate at the
site, the bag can lose its air, and the proximity sensor can sense
that the bin is less full than it was twenty minutes prior, which
would not be the case if the bin was full with trash instead of
air. Thus, "false positive" information can be filtered out.
[0058] Likewise, tests and checks can be performed so that false
negative information is avoided as well. For example, if a bin
regularly fills up daily, and there is no message that it is full
after two or three days, an alert can appear on the users' web page
indicating an aberration. Thresholds for normal operating
parameters and adjustments to normal can be set or reset using the
RCD 244, or they can be programmed to evolve through pattern
recognition. Although many operating parameter adjustments can be
made through the web portal, adjustments can also be made
automatically. This can be controlled by a software program that
aggregates data and uses patterns in an aggregate of enclosures to
alter PCB 210 settings on a single enclosure. For example, if the
collection data from 1,000 enclosures indicates that collection
personnel collect from bins too early 50% of the time when
compaction threshold setting is set to "high", compared to 10% of
the time when compaction settings are set at "medium," then the RCD
244 can reprogram the compaction thresholds to the medium setting
automatically, so that collection personnel can be managed better,
limiting the amount of enclosures that are collected prematurely.
Automatic reprogramming, governed by software programs, can be
applied to other aspects, such as user response to dynamic elements
of the receptacle 204, such as lighted or interactive advertising
media displayed on the receptacle 204. For example, if users
respond to an LCD-displayed advertisement shown on the receptacle
204 for "discounted local coffee" 80% of the time, the RCD 244 can
configure all receptacles within a certain distance, from
participating coffee shops, to display the message: "discounted
local coffee."
[0059] In some embodiments, the RCD 244 can include a data
receiving portal for the user with information displays about an
aggregate of receptacles. Here, the user can access real-time and
historical information of, for example, receptacles on a route,
and/or receptacles in a given geography. The data can be displayed
for the user on a password-protected web page associated with the
aggregate of receptacles within a user group. The receptacle 204
can also display, for example, bin fullness, collections made, the
time of collections, battery voltage, motor current, number and
time of compaction cycles run, graphs and charts, lists and maps,
etc. This data can be viewed in different segments of time and
geography in order to assess receptacle and/or fleet status, usage,
and/or trends. The users' web page can show, for example, a pie
chart showing percentage of bins collected when their LED was
blinking yellow, red and green, or a histogram showing these
percentages as a function of time. These statistics can be
categorized using pull down menus and single-click features. A
single click map feature, for example, is where summary data for a
particular receptacle is displayed after the user clicks on a dot
displayed on a map which represents that receptacle. This can allow
the user to easily view and interact with a visual map in an
external application.
[0060] The RCD 244 can be configured to display calculated data,
such as "collection efficiency," which is a comparison of
collections made to collections required, as measured by the
utilized capacity of the receptacle 204 divided by the total
capacity of the receptacle 204 (Collection Efficiency=utilized
capacity/total capacity). The user can use this information to
increase or decrease collections, increase or decrease the
aggregate capacity across an area, etc. Typically, the users' goal
is to collect the receptacle 204 when it is full--not before or
after. The user can click buttons on their web page to show
historical trends, such as collection efficiency over time, vehicle
costs, a comparison of vehicle usage in one time period versus
vehicle usage in another time period, diversion rates, a comparison
of material quantity deposited in a recycling bin versus the
quantity of material deposited into a trash bin. Other statistics
can be automatically generated and can include carbon dioxide
emissions from trucks, which can be highly correlated to vehicle
usage. Labor hours can also be highly correlated with vehicle
usage, so the web page can display a labor cost statistic
automatically using information generated from the vehicle usage
monitor. As the user clicks on buttons or otherwise makes commands
in their web portal, the RCD 244 can change the PCB's 210 operating
parameters, usage of sensors, etc., and/or measurement thresholds
in response. The RCD 244 can also be configured to automatically
display suggested alterations to the fleet, such as suggestions to
move receptacles to a new position, to increase or decrease the
quantity of receptacles in a given area, to recommend a new size
receptacle based on its programmed thresholds, resulting in an
improvement in costs to service the fleet of receptacles.
[0061] Heat mapping can also be used to provide a graphical
representation of data for a user. Heat mapping can show the user
the level of capacity in each part of an area, for example a city
block, or it can be used to show collection frequency in an area.
In each case, the heat map can be generated by associating
different colors with different values of data in a cross
sectional, comparative data set, including data from a plurality of
enclosures. The heat map can be a graphical representation of
comparative data sets. In some embodiments, red can be associated
with a high number of a given characteristic, and "cooler" colors,
like orange, yellow and blue, can be used to depict areas with less
of a given characteristic. For example, a heat map showing
collection frequency or compaction frequency across 500 receptacles
can be useful to determine areas where capacity is lacking in the
aggregate of enclosures--a relative measure of capacity. In this
case, the highest frequency receptacle can assigned a value of red.
Each number can be assigned progressively cooler colors. In other
embodiments, the red value can be associated with a deviation from
the average or median, for example, a darker red for each standard
deviation. The heat maps can be shown as a visual aid on the user's
web page, and can color-code regions where "bottlenecks" restrict
vehicle and labor efficiency. A small red region can show
graphically, for example, that if the user were to replace only ten
receptacles with higher-capacity compactors, the collection
frequency to a larger area could be reduced, saving travel time.
Heat maps can be a helpful visual tool for showing data including,
but not limited to, data showing "most collections" in a given time
period, "most green collections," which can visually demonstrate
the number of bins collected too early (before they are actually
full), "most compactions," which can show on a more granular level
the usage level of the bin, "most uses," which can represent how
many times the insertion door of the bin is opened or utilized,
"most alerts," which can show visually the number of "door open
alerts," which can show when doors were not closed properly,
"voltage alerts," which can show visually which receptacles are of
low power, etc. While specific measurements are described herein to
demonstrate the usefulness of heat mapping, there are other sets of
data that can be represented by the heat maps, which are within the
scope and spirit of this invention.
[0062] The heat map can also be used to present a population
density in one or more areas, as well as a representation of any
other activity or characteristic of the area, such as current
traffic or congestion, for example. This information can also be
shared with other businesses or devices. For example, the RCD 244
can analyze the heat map and share population statistics or
activity with nearby businesses or municipalities. The RCD 244 can,
for example, determine a high population density in Area A on
Saturday mornings and transmit that information to a nearby locale
to help the nearby locale prepare for the additional activity. As
another example, if the receptacle is placed in a park, the RCD 244
can determine population and activity levels at specific times and
alert park officials of the expected high levels of activity so the
park officials and/or those managing the receptacle can plan
accordingly.
[0063] The RCD 244 can also be used for dynamic vehicle routing and
compaction and/or receptacle management. Because the RCD 244 can be
a two-way communicator, it can both send and receive information
between various receptacles and databases. This can allow the user
to cross-correlate data between the fleet of receptacles and the
fleet of collection vehicles. The RCD 244 can receive data from the
user and/or the user's vehicle. For example, the RCD 244 can
receive GPS data or availability data, and use it to change
parameters on a given receptacle or aggregate of receptacles. The
RCD 244 can receive this data from the users' GPS-enabled
smartphone, for example. Similarly, the RCD 244 can send data to
the user, a user device, a smartphone, etc., about the status of
the receptacle 204. With this two-way data stream, collection
optimization can be calculated in real time or close to real time.
For example, a collection truck is traveling to the east side of a
city and has 30 minutes of spare time. The RCD 244 can receive
information about the truck's whereabouts, availability and
direction, and query a database for receptacle real time and
historical fullness information and determine that the truck can
accommodate collections of twenty receptacle locations. The RCD 244
can then display a list of twenty receptacle locations that the
truck can accommodate. The user can view a map of the twenty
recommended locations, see a list of driving directions, etc. The
map of driving directions can be optimized by adding other input
data, such as traffic lights, traffic conditions, average speed
along each route, etc. At the same time, as the truck heads to the
east side of the city, the RCD 244 can reconfigure receptacles on
the west side to change compaction thresholds, so that capacity is
temporarily increased, freeing up additional time for the truck to
spend in the east section. Alternatively, the RCD 244 can
reconfigure a receptacle to temporarily display a "full" message to
pedestrians, helping them find a nearby receptacle with capacity
remaining. The RCD 244 can, in the case where the receptacle
requires payment, increase pricing to the almost-full receptacle,
reducing demand by pedestrians or other users. This same logic can
be effective in situations where trucks are not used, for example,
indoors at a mall or airport. The demand for waste capacity can
vary, so having remote control over the receptacle 204 can allow
users to change settings, parameters, and/or prices to make the
collection of waste dynamic and efficient.
[0064] The location of the receptacle 204 and other receptacles can
be determined via triangulation and/or GPS, for example, and placed
on a map in the interactive mapping features. Moreover, the
location of an indoor receptacle can be obtained from indoor WiFi
hot spots, and the indoor receptacle can be placed on a map in the
interactive mapping features. As a staff member accomplishes tasks
(i.e., cleaning a bathroom) and moves inside a facility, the staff
member's location can be tracked, and the fullness and location of
nearby receptacles can be plotted on a map or given to the staff
member by other means, as instructions to add a collection activity
to the list of tasks. Whether by GPS, Wifi, Bluetooth, etc.,
triangulation between communication nodes can serve to locate a
receptacle on a map, and measurements of fullness of receptacles
can be used to create work instructions for staff members or truck
drivers, so that efficient routes and schedules can be created to
save time.
[0065] To better manage the collection process, user groups can be
separated between trash and recycling personnel. In many cities,
there are separate trucks used to collect separate streams of
waste, such as trash and recyclables. For this reason, it can be
helpful to configure the user's web page to display data based on a
waste stream. The data can also be divided in this fashion and
displayed differently on a smartphone, hand-held computer, and/or
other user device. In addition, data can be displayed differently
to different users. For example, the manager of an operation can
have "administrative privileges," and thus can change the location
of a particular receptacle in the system, view collection
efficiency of a particular waste collector, view login history,
and/or view industry or subgroup benchmarks, while a waste
collector with lower privileges can only view receptacle fullness,
for example. The RCD 244 or another device can also be configured
to print a list of receptacles to collect next, a list of full or
partially full bins, etc. For example, the remote device 252 can be
configured to print a list of receptacles to collect in the
remaining portion of a route.
[0066] FIG. 3 illustrates an example storage receptacle 300. The
storage receptacle 300 includes a bin 302 for storing content
items, and a door 306 for opening the storage receptacle 300 to
throw items in the bin 302. The storage receptacle 300 can have one
or more sensors 304A-B, such as photoeye sensors, placed above the
bin 302 for detecting the fullness state of the bin 302. The
storage receptacle 300 can also include a sonar sensor 308 to
detect objects in the receptacle 300 and calculate the fullness
state of the receptacle 300. As one of ordinary skill in the art
will readily recognize, the sonar sensor 308 and sensors 304A-B can
also be placed in other locations based on the size and/or capacity
of the receptacle 300, storage requirements, storage conditions,
etc. The storage receptacle 300 can also include other types of
sensors, such as an infrared sensor, a temperature sensor, a hall
effect sensor, an encoder sensor, a motion sensor, a proximity
sensor, etc. The sonar sensor 308 and sensors 304A-B can sense
fullness at regular intervals, and/or based on manual inputs and/or
a pre-programmed schedule, for example. Moreover, the sonar sensor
308 and sensors 304A-B are electrically connected to the printed
circuit board (PCB) 316. Further, the sonar sensor 308 and sensors
304A-B can be actuated by the PCB 316, which can be configured to
control the various operations of the storage receptacle 300.
[0067] The PCB 316 can control electrical functions performed by
the storage receptacle 300. The electrical functions controlled by
the PCB 316 can include, for example, running compactions by
actuating a motor; sensing waste or recyclables volume inside the
receptacle 300 using a sensor at regular or programmable intervals,
such as sensors 304A-B; changing status lamps 318 at regular and/or
programmable thresholds to/from a color indicating that the
receptacle 300 is not full (e.g., green), to/from a color
indicating that the receptacle 300 is almost full (e.g., yellow),
to/from a color indicating that the receptacle 300 is full (e.g.,
red); collecting data and transmitting the data to another device;
receiving data from another device; managing a power mode;
measuring and managing a current; performing diagnostics tests;
managing a power source; etc. The motor controller 310 can enable
voltage to be applied across a load in either direction. The PCB
316 can use the motor controller 310 to enable a DC motor in the
receptacle 300 to run forwards and backwards, to speed or slow, to
"brake" the motor, etc.
[0068] The storage receptacle 300 includes a transmitter 312 and a
receiver 314 for sending and receiving data to and from other
devices, such as a server or a remote control device. Accordingly,
the storage receptacle 300 can transmit and receive information
such as instructions, commands, statistics, alerts, notifications,
files, software, data, and so forth. The transmitter 312 and
receiver 314 can be electrically connected to the PCB 316. This
way, the transmitter 312 can transmit data from the PCB 316 to
other devices, and the receiver 314 can receive data from other
devices and pass the data for use by the PCB 316. In this regard, a
user who is checking the status of the receptacle could drive down
the street near the device (say within a wireless range, such as
Bluetooth or WIFI, for example), not even get out of their vehicle,
but receive a signal indicating that all is well, that the trash
needs to be emptied, or that a repair or cleaning is needed.
[0069] Status lamps 318 can provide an indication of the status of
the storage receptacle 300. For example, the status lamps 318 can
indicate the fullness state of the storage receptacle 300. To this
end, the status lamps 318 can be configured to display a respective
color or pattern when the storage receptacle 300 is full, almost
full, not full, etc. For example, the status lamps 318 can be
configured to flash red when the storage receptacle 300 is full,
yellow when the storage receptacle 300 is almost full, and green
when the storage receptacle 300 is not full. Moreover, the status
lamps 318 can be LED lights, for example.
[0070] The status lamps 318 can also be configured to flash in
various patterns to indicate various other conditions. For example,
the status lamps 318 can be configured to flash at the same time
and in combination to show that the receptacle 300 is full. The
status lamps 318 can also be configured to flash in different
patterns or times or colors to show troubleshooting status
information for example. In some cases, the status lamps 318 can be
configured to flash in a predetermined manner to show that a door
of the receptacle is open, a component is damaged, an obstacle is
stuck, an operation is currently active, etc.
[0071] As one of ordinary skill in the art will readily recognize,
the receptacle 300 can include other components, such as motors,
sensors, batteries, solar panels, displays, relays, chargers, GPS
devices, timers, fuses, resistors, remote control devices, cameras,
etc. However, for the sake of clarity, the receptacle 300 is
illustrated without some of these components.
[0072] Referring now to FIGS. 4A and 4B, unsecured receptacle 400A
illustrates a storage receptacle, such as receptacle 300 in FIG. 3,
operating under normal security conditions. The door 402 is shown
in which a user can open the door and put in trash. The larger door
406 houses the door 402. A hinge 408 can be positioned along a
right side edge of the door 406 and enable the door 406 to be
opened exposing the interior of the receptacle and the security
plate 404 to be installed. On the other hand, secured receptacle
400B illustrates the receptacle operating under a security
condition with the security plate 404 installed on the door 406 to
prevent the door 402 from being opened. The security condition can
include a circumstance where there is a potential for a security
breach, a terrorist attack or attempt, a conspiracy, a legal order,
a crime condition, a heightened state of security, a lock-down
state, a crime scene, a vandalism, a conspiracy, an unauthorized
access, etc. Under the security condition, the system in the
receptacle 400B is engaged and monitoring of the receptacle occurs
so as to sense whether a security breach is being attempted.
[0073] Receptacles 400A-B can include a door 402, which can serve
as an insertion point to allow users to dispose materials for
storage in the bin on the receptacles 400A-B. When operating under
a security condition, the receptacle can be fitted with a security
plate 404 to block or limit movement of the door 402 to prevent
users from opening the door 402 to insert or dispose materials into
the receptacle. In some aspects, the security plate 404 can cover
at least a portion of the door 402 and at least partially
immobilize the door to prevent opening or forced entry. The
security plate 404 can prevent movement of the door in either
direction: either forward movement, backward movement, or both.
This way, a user cannot open the door 402 by pushing inward or
pulling outward.
[0074] The security plate 404 can also serve as a notice to nearby
users that the receptacle 400B is locked, "out-of-order," or
otherwise operating under a security condition. For example, when a
user walks to receptacle 400B to dispose of a waste item, she can
quickly determine that the secure receptacle 400B is currently not
in use when she sees the security plate 404 over the door 402. In
some cases, the security plate 404 can also display a message to
the users, such as an "out-of-order" message.
[0075] In some embodiments, the security plate 404 can be installed
upon a notification or alert of a security condition at the
unsecured receptacle 400A or a surrounding area. For example, the
unsecured receptacle 400A can send an alert to a remote device,
such as a server, indicating that the unsecured receptacle 400A is
operating in a normal mode. The unsecured receptacle 400A can also
send a signal indicating a detected security condition to the
remote device. Upon receipt of the alert(s) or signal(s) from the
unsecured receptacle 400A, a user can be dispatched to the
unsecured receptacle 400A to install the security plate 404,
according to secured receptacle 400B for example, and any other
necessary security features. Once the security condition is over,
the secured receptacle 400B can again send a signal indicating that
the security condition is over or that the security plate 404
should be removed.
[0076] In some embodiments, the secured receptacle 404B can also
include a security pin (not shown) fitted or attached inside the
secured receptacle 404B to further prevent the door 402 from being
opened by a user. The security pin can limit movement of the door
and block the door from being opened. The security pin can provide
a second layer of security when combined with the security plate
404 by further securing or locking the door 402 to prevent
insertion of content items into the secured receptacle 400B. In
some aspects, the security pin can be coupled to a hinge mechanism
of the door 402 to prevent opening of the door 402.
[0077] The security plate 404 can be attached, secured, or
installed in a top edge of the secured receptacle 400B. However, in
some embodiments, the security plate 404 can be attached, secured,
or installed in a different position or location on the secured
receptacle 400B. For example, the security plate 404 can be
installed on an opening side of the door 402, the inside of the
secured receptacle 400B, etc. Moreover, while FIG. 4B illustrates
one security plate, one of ordinary skill in the art will readily
recognize that additional security plates can also be installed in
some cases. For example, a security plate can be installed in the
front of the secured receptacle 400B and a second security plate
can be installed in the inside of the secured receptacle 400B.
[0078] Further, while FIG. 4B illustrates a use of a security plate
for securing or locking the receptacle, one of ordinary skill in
the art will recognize the other means can be used in addition to,
or in lieu of, the security plate 404. For example, the secured
receptacle 400B can be secured or locked down using the security
pin previously described with or without the security plate. As
another example, the secured receptacle 400B can be locked down
using a lock or any other locking mechanism or hardware, such as a
deadbolt or a lock set. Such security mechanisms can be implemented
under a security condition, which can be detected and/or monitored
by the receptacle as previously described.
[0079] As further described herein, the secured receptacle 400B can
also detect and monitor events and transmit such data to a remote
device, such as a server, to be collected or displayed for future
or current analysis. For example, the secured receptacle 400B can
monitor and detect any attempts to open the door 402, remove the
security plate 404, or tamper with the security receptacle 400B.
The secured receptacle 400B can monitor and detect such events
using one or more sensors, such as photoeye sensors, cameras,
defect detector sensors, water sensors, pressure sensors, noise
sensors, chemical or particle sensors, motion sensors, gyroscopes,
image sensors, etc. In some cases, the receptacle can be configured
to monitor and detect hazardous or illegal materials, such as
explosive materials, being deposited into the receptacle. The
receptacle can also detect if a portion of the receptacle, such as
a door or a handle, comes into contact with specific substances,
such as explosives. For example, if a user having gun powder
residue in her hands attempts to open the door on the receptacle or
otherwise come in contact with the receptacle, the receptacle can
be configured to detect the gun powder residue and generate a
signal, alarm, or notification.
[0080] Once the secured receptacle 400B has detected a breach
attempt or a hazardous substance, for example, the secured
receptacle 400B can transmit any sensed or monitored data to a
remote device. The remote device can then collect the data, present
the data via a display or interface, analyze the data, and/or use
the data in a remote control and analysis software application, for
example. The remote device can also transmit the data to another
device, such as a server, or another entity, such as a law
enforcement agency.
[0081] Referring now to FIGS. 5A-D, receptacle 500 can include a
door 502 which can be accessible to nearby users and serve as an
insertion point for users to insert materials into the receptacle
500. The door 502 can be pushed or pulled by a user to provide an
opening that allows a user to place items inside the receptacle
500. In some aspects, the door 502 can swing backwards when pushed
by a user in order to create an opening into the receptacle 500 for
storing or disposing materials into the receptacle 500.
[0082] When a security condition is detected or otherwise signaled,
a user can install security plate 504 to secure and/or protect the
receptacle 500 as illustrated in the secured receptacle 500 in FIG.
5B. The receptacle 500 can then monitor or detect any attempts to
open the security plate 504 or tamper with the receptacle 500
and/or transmit any sensed data, information, or alerts to a remote
device, as previously described in FIGS. 2 and 4.
[0083] The receptacle 500 can also include an access door 506 which
can be opened from outside of the receptacle 500 to access the
inside 508 of the receptacle 500. When opened, the access door 506
also provides access to the door 502 and allows a user to install
the security plate 504 over the door 502, as previously described.
Once the security plate 504 is installed over the door 502, the
access door 506 can be closed and locked to prevent unauthorized
access to the inside 508 of the receptacle.
[0084] In some embodiments, the security plate 504 can be placed to
cover at least a portion of the door 502 by opening the access door
506 and securing the security plate 504 on the outside of the
access door 506. In some cases, a user installing the security
plate 504 can simply slide or attach the security plate 504 to the
outside of the access door 506 and/or the top of the door 502, as
illustrated in FIG. 5D. When the access door 506 is closed and/or
locked, the security plate 504 can become further constrained or
secured on the receptacle 500 to prevent unauthorized removal of
the security plate 504. This way, a user is required to open the
access door 506 in order to remove the security plate 504. Thus, a
user cannot properly remove the security plate 504 without the
corresponding means, such as a key or a code, for unlocking and
opening the access door 506. In some cases, the security plate 504
can also be configured to include one or more latches or additional
locking mechanisms to snap or attach to the receptacle 500 for
additional support, locking, and security.
[0085] FIG. 6 illustrates a backside view 600 of the security plate
504. The security plate 504 in the backside view 600 is shown
removed from the receptacle 500. The security plate 504 can be
designed for coupling to a corresponding portion of the receptacle
500 for securing the security plate 504 to the receptacle 500. As
shown in FIG. 6, the security plate as a clean surface along a
bottom portion of the plate, and a raised flange on a right hand
portion of the plate, which, when the plate is installed, will
cover the left hand portion of the door 406. The top portion of the
plate 502 also includes a first flange 602 that protrudes from at
least a portion of the top edge of the plate 504. The first flange
602 has a second flange 602 that protrudes out of a portion of the
surface of the first flange 602. The second flange 604 is generally
parallel to the plate 504. Screw holes can be placed in the second
flange 604 for securing the plate 504 in place on the door 406. The
structure of these flanges enable a top portion of the plate 504 to
be secured on the door 406 in a secure manner such that a person
cannot easily pull the plate off. FIGS. 5C and 5D illustrate the
installation of the plate on the door 406.
[0086] FIG. 7 illustrates an exemplary inside locking mechanism for
a receptacle 700. The receptacle 700 can include a door 706 which
can provide an opening or insertion point similar to the door 502
in FIGS. 5A-D. The security pin 702 can be used to lock the door
706 from being opened by a user from the outside. The security pin
702 can be attached through a whole on the receptacle 700 via a
card 704 that is attached to the door 706, to prevent the door 706
from being opened. The security pin 702 can thus provide a locking
mechanism to secure the door 706 and prevent access to the inside
of the receptacle through the insertion point on the door 702. The
security pin 702 can be of varying length and size based on the
size of the receptacle 700 and/or the door 706, the security
requirements, the weight and materials of the receptacle 700 and/or
the door 706, or any other factor according to conventional
methods.
[0087] Having disclosed some basic system components and concepts,
the disclosure now turns to the example method embodiments shown in
FIGS. 8 and 9. For the sake of clarity, the method in FIG. 8 is
described in terms of example system 100, as shown in FIG. 1,
configured to practice the methods. Moreover, for the sake of
clarity, the method in FIG. 9 is described in terms of example
receptacle 300, as shown in FIG. 3, configured to practice the
methods. The steps outlined herein are illustrative and can be
implemented in any combination thereof, including combinations that
exclude, add, or modify certain steps.
[0088] Referring first to FIG. 8, the system 100 can monitor, under
a security condition, a storage receptacle having a security plate
being positioned over a door on the storage receptacle, the door
including an insertion point for storing contents on the storage
receptacle, and the security plate being configured to block an
opening of the door to prevent insertion of additional contents in
the storage receptacle (800). The system 100 can monitor the
storage receptacle using sensors, data connections, algorithms,
user feedback, news information, usage and performance data, device
statistics, and so forth. For example, the system 100 can monitor a
data connection of the storage receptacle, as well as sensed data
collected by sensors at the storage receptacle and transmitted to
the system via the data connection. Through the data connection,
the system 100 can also receive, from the storage receptacle, a
current status of the storage receptacle, a current usage,
information about running services at the storage receptacle,
errors at the storage receptacle, logged information, etc.
[0089] The storage receptacle can also be configured to detect
dangerous substances that come in contact with one or more
components of the storage receptacle. For example, the storage
receptacle can be configured to detect if explosive materials are
inserted into the storage receptacle. To this end, the storage
receptacle can be configured to use one or more sensors for
detecting specific types of substances, such as chemical or
particle sensors, scanners, chemical testing materials, etc.
[0090] In some cases, the storage receptacle can be configured with
a sensor or scanner capable of detecting if a person that has
touched a portion of the storage receptacle, such as the handle,
has left any traces of an explosive substance, such as gun powder,
on the touched portion of the storage receptacle. For example, if
an individual with traces of gun powder or bomb making materials on
his or her hand grabs the handle of the storage receptacle to open
the door, the storage receptacle can detect the traces of gun
powder or bomb making materials, and generate a signal or alarm.
The storage receptacle can then send the signal to a remote server
or another entity, such as a police department, to alert others of
the detected traces of explosive materials.
[0091] Next, the system 100 can receive a signal indicating a
security breach at the storage receptacle, the security breach
including at least one of an attempt to open the door and an
attempt to remove the security plate (802). The system might sense
for a series of actions such as first an attempt to open the door
(either the smaller door for entering trash, or the larger door for
getting to the interior of the receptacle.) and then a second
attempt to remove the security plate. The system 100 can receive
the signal from a transmitter at the storage receptacle, for
example. Moreover, the storage receptacle can generate the signal
based on sensed data, performance logs, errors, current usage
information, etc., as previously described. Other breaches could be
sensed for as well, such as a movement of the entire receptacle, or
any attempt to obtain access to the inside such as through the back
or the top of the receptacle.
[0092] In response to the signal, the system 100 can then generate
a notification of the security breach (804). The notification can
be an alert, a report, an alarm, a message, another signal, etc.
The system 100 can also send the notification to another user or
device, such as a remote server or a device associated with a
security official. The system may provide a series of notifications
such as an event coordinator or security officer as well as police
or fire officials. Participants in an event may also be stored in
the system such that notifications could go out. In some aspects,
the system 100 can also store the notification in a database or
storage to maintain statistics, evidence, logs, and data relating
to the security breach and any other previous security breach. The
system 100 can also analyze the signal or notification and generate
a recommendation, such as a recommended or suggested response.
Thus, in once example, if a marathon is going on, and a security
event or condition occurs at one of the receptacles, one or more of
the following people could get a notification or an alert: Marathon
officials, police/fire officials, runners in the marathon,
spectators, etc. Thus, notification could immediately go out with
particular information about the location of the receptacle and
instructions.
[0093] Referring to FIG. 9, the receptacle 300 can detect a
security condition associated with at least one of a storage
receptacle and an area around the storage receptacle (900). The
security condition can include, for example, criminal activity, a
terrorist attempt, a terrorist plot, a lock-down period, a
heightened state of security, a conspiracy, a security breach,
vandalism, a police situation, an enforcement condition, a crime
scene, a security request, etc. Moreover, the receptacle 300 can
detect the security condition using one or more sensors as
previously described. In some aspects, the receptacle 300 can be
configured to monitor events, such as nearby movements, external
forces, data events (e.g., network alerts or data connections),
surrounding conditions, environment parameters, usage events, news
events, etc.
[0094] Next, based on the security condition, a security plate is
installed over a door on the receptacle 300, the door including an
insertion point for storing contents on the receptacle 300, and the
security plate being configured to block an opening of the door to
prevent insertion of additional contents in the receptacle 300
(902). The security plate can be installed by a user in response to
the security condition. In some aspects, the receptacle 300 can
generate a signal, alarm, message, or notification relating to the
security condition or a security request to trigger the
installation of the security plate. For example, the receptacle 300
can transmit a security-plate installation request along with a
location associated with the receptacle 300, a timestamp, and/or
any other information.
[0095] In some aspects, the receptacle 300 can also be configured
to automatically install the security plate in response to the
security condition. For example, the receptacle 300 can be designed
to maintain the security plate in an open position, and configure
the security plate to automatically shut or close over the door
(and/or any other opening in the receptacle 300) in response to the
security condition. Here, the receptacle can include a locking or
closing mechanism coupled to the security plate which can be
triggered by a signal from a processor associated with the
receptacle 300. The receptacle 300 can then send a signal to a
remote device indicating that the security plate has been
installed, locked, or secured, as well as any other additional
details regarding the security plate, the receptacle 300, or the
security condition.
[0096] Then, based on the security condition, the receptacle 300
can lock the door in a closed position using a locking pin located
inside the storage receptacle, the locking pin limiting movement of
the door on the storage receptacle to further prevent insertion of
additional contents in the storage receptacle (904). The locking
pin can be automatically placed in a locked position by the
receptacle 300 using a locking mechanism configured to respond to a
signal from the processor. In other cases, the locking pin can be
manually inserted into the receptacle 300 and/or placed in a locked
position by a user in response to the security condition or a
request from the receptacle 300.
[0097] Next, the receptacle 300 can monitor the storage receptacle
via a sensor configured to detect a security breach associated with
at least one of the door on the storage device and the security
plate (906). The sensor can include one or more sensors as
previously described. Moreover, the receptacle 300 can transmit any
sensed data to a remote device, such as a server, to be stored,
collected, forwarded, analyzed, or manipulated by the remote
device. In some cases, the receptacle 300 can transmit sensed data
to be used on an application at the remote device to control and/or
monitor the receptacle 300.
[0098] In some cases, the receptacle 300 can also be configured to
maintain and/or monitor a data connection to a network or a server.
For example, the receptacle 300 can maintain a wireless connection
to a server via a network, and detect any loss of data connection.
If the data connection is lost, the receptacle 300 can trigger an
alarm indicating a security issue. Similarly, the server can
trigger an alarm or notification indicating that the receptacle 300
has lost the data connection. In response, the server, or a user
receiving the indication from the server, can respond to the loss
of connection appropriately. For example, the user can contact the
authorities if he or she suspects that the receptacle 300 lost the
data connection as a result of a criminal act or event.
[0099] In some configurations, the receptacle 300 can also be
configured to detect dangerous substances that come in contact with
one or more components of the receptacle 300. For example, the
receptacle 300 can be configured to detect if explosive materials
are inserted into the receptacle 300. In some cases, the receptacle
300 can be configured with a sensor or scanner capable of detecting
if a person that has touched a portion of the receptacle 300, such
as the handle, has left any traces of an explosive substance, such
as gun powder, on the touched portion of the receptacle 300. For
example, if an individual with traces of gun powder or bomb making
materials on his or her hand grabs the handle of the receptacle 300
to open the door, the receptacle 300 can detect the traces of gun
powder or bomb making materials, and generate a signal or alarm.
The storage receptacle can then send the signal to a remote server
or another entity, such as a police department, to alert others of
the detected traces of explosive materials.
[0100] Embodiments within the scope of the present disclosure may
also include tangible and/or non-transitory computer-readable
storage devices for carrying or having computer-executable
instructions or data structures stored thereon. Such tangible
computer-readable storage devices can be any available device that
can be accessed by a general purpose or special purpose computer,
including the functional design of any special purpose processor as
described above. By way of example, and not limitation, such
tangible computer-readable devices can include RAM, ROM, EEPROM,
CD-ROM or other optical disk storage, magnetic disk storage or
other magnetic storage devices, or any other device which can be
used to carry or store desired program code in the form of
computer-executable instructions, data structures, or processor
chip design. When information or instructions are provided via a
network or another communications connection (either hardwired,
wireless, or combination thereof) to a computer, the computer
properly views the connection as a computer-readable medium. Thus,
any such connection is properly termed a computer-readable medium.
Combinations of the above should also be included within the scope
of the computer-readable storage devices.
[0101] Computer-executable instructions include, for example,
instructions and data which cause a general purpose computer,
special purpose computer, or special purpose processing device to
perform a certain function or group of functions.
Computer-executable instructions also include program modules that
are executed by computers in stand-alone or network environments.
Generally, program modules include routines, programs, components,
data structures, objects, and the functions inherent in the design
of special-purpose processors, etc. that perform particular tasks
or implement particular abstract data types. Computer-executable
instructions, associated data structures, and program modules
represent examples of the program code means for executing steps of
the methods disclosed herein. The particular sequence of such
executable instructions or associated data structures represents
examples of corresponding acts for implementing the functions
described in such steps.
[0102] Other embodiments of the disclosure may be practiced in
network computing environments with many types of computer system
configurations, including personal computers, hand-held devices,
multi-processor systems, microprocessor-based or programmable
consumer electronics, network PCs, minicomputers, mainframe
computers, and the like. Embodiments may also be practiced in
distributed computing environments where tasks are performed by
local and remote processing devices that are linked (either by
hardwired links, wireless links, or by a combination thereof)
through a communications network. In a distributed computing
environment, program modules may be located in both local and
remote memory storage devices.
[0103] The various embodiments described above are provided by way
of illustration only and should not be construed to limit the scope
of the disclosure. Various modifications and changes may be made to
the principles described herein without following the example
embodiments and applications illustrated and described herein, and
without departing from the spirit and scope of the disclosure.
Claim language reciting "at least one of" a set indicates that one
member of the set or multiple members of the set satisfy the
claim.
* * * * *